Sciweavers

3088 search results - page 56 / 618
» Multichannel Security Protocols
Sort
View
GLOBECOM
2008
IEEE
14 years 11 months ago
Probabilistic Path Selection in Opportunistic Cognitive Radio Networks
Abstract—We present a novel routing approach for multichannel cognitive radio networks (CRNs). Our approach is based on probabilistically estimating the available capacity of eve...
Hicham Khalife, Satyajeet Ahuja, Naceur Malouch, M...
COMCOM
2008
158views more  COMCOM 2008»
14 years 10 months ago
Load aware traffic engineering for mesh networks
Wireless Mesh Network (WMN) is a multi-hop mesh network that consists of mesh routers and mesh clients, where mesh routers are static and form the backbone of the mesh network. Th...
Devu Manikantan Shila, Tricha Anjali
107
Voted
TMC
2010
137views more  TMC 2010»
14 years 8 months ago
A Metric for DISH Networks: Analysis, Implications, and Applications
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
Tie Luo, Vikram Srinivasan, Mehul Motani
94
Voted
MOBIHOC
2012
ACM
13 years 17 days ago
Stability analyses of longest-queue-first link scheduling in MC-MR wireless networks
Longest-queue-first (LQF) link scheduling is a greedy link scheduling in multihop wireless networks. Its stability performance in single-channel single-radio (SC-SR) wireless net...
Peng-Jun Wan, XiaoHua Xu, Zhu Wang, ShaoJie Tang, ...
CCS
2008
ACM
15 years 4 days ago
Verified implementations of the information card federated identity-management protocol
We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card
Karthikeyan Bhargavan, Cédric Fournet, Andr...